MiTM network attack on a large bank in which a PocketPort2 Cellular Modem Bridge from Proxicast was used and had gone undetected for months.
MiTM network attack on a large bank in which a PocketPort2 Cellular Modem Bridge from Proxicast was used and had gone undetected for months.
Cyber attacks against energy sector are critical-a cyber attack can cause significant damage-taking proper cybersecurity measures is crucial.
Captain RDM helps the CISO gain ultimate visibility, control & policy enforcement (with our HAC-1 solution), and pass his annual PT/VA audit!
MSSPs can provide services for companies concerned with improving the security of customer-facing services and applications, addressing existing threats and vulnerabilities.
Very insightful interview with Kathleen Casey, Former Commissioner @SEC
We are so lucky to have such wonderful and inspirational women on our team and board!
Rogue Device attacks on ATMs are on the rise.
The Project Manager Defensive Cyber Operations (PM-DCO) is hosting a “Cyber Talk” with SOSSEC members and interested companies for an Informational and Educational Briefing by Sepio- Complete Control of all Hardware Devices and Full Asset Visibility which enables you to block Rogue Devices. Join us on March 4, 2021, at 1 pm EST.
Edward Amoroso and Jay Smilyk discuss the greatest threats to cybersecurity.
The Data Security & Privacy Global Virtual Event will be taking place on March 16th – 17th.CISO Roundtable: Critical Infrastructure cyber attacks – data theft, operational disruption and other consequences. In this virtual event, Bentsi Ben-atar, CMO & Co-founder of Sepio Systems and Jessica Amado, Head of Cyber Research at Sepio Systems will be speaking….
Very fascinating interview with Robert Bigman, Former CISO @CIA
Regulation is effective only when it can be enforced. Captain RDM helps a Federal Agency to detect the presence of unauthorized devices.
Find out how hackers attempt to steal the COVID vaccine and what Captain RDM and his wife, RDM do to save the day!
Sepio’s software-only solution provides complete visibility to whatever is connected over the client’s entire Enterprise; whether it be connected directly to an Endpoint or as concealed as a Network element.